|
1.
|
Security engineering : a guide to building dependable distributed systems
by Anderson, Ross. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: New Delhi : Wiley, c2008Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 AND-S] (4). Items available for reference: IIITD [REF 005.8 AND-S] (1).
(1 votes)
|
|
2.
|
Security and usability : designing secure systems that people can use
by Cranor, Lorrie Faith | Garfinkel, Simson. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Beijing ; Sebastapol, CA : O'Reilly, ©2005Online access: Table of contents | Publisher description Availability: Items available for reference: IIITD [REF 005.8 CRA-S] (1).
|
|
3.
|
Scene of cybercrime
by Shinder, Debra Littlejohn | Cross, Michael. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Burlington : Syngress, c2008Availability: Items available for reference: IIITD [REF 005.8 SHI-S] (1).
|
|
4.
|
Phishing and countermeasures : understanding the increasing problem of electronic identity theft
by Jakobsson, Markus | Myers, Steven 1975-. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Hoboken, N.J. : Wiley, c2007Online access: Table of contents only | Publisher description | Contributor biographical information Availability: Items available for reference: IIITD [REF 005.8 JAK-P] (1).
|
|
5.
|
Crimeware : understanding new attacks and defenses
by Jakobsson, Markus | Ramzan, Zulfikar. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Online access: Table of contents only Availability: Items available for reference: IIITD [REF 005.8 JAK-C] (1).
|
|
6.
|
Introduction to computer security
by Bishop, Matt (Matthew A.). Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Boston : Addison-Wesley, c2005Online access: Table of contents Availability: Items available for reference: IIITD [REF 005.8 BIS-I] (1).
|
|
7.
|
Fundamentals of computer security
by Pieprzyk, Josef. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: New York : Springer, ©2003Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 PIE-F] (1). Items available for reference: IIITD [REF 005.8 PIE-F] (1).
|
|
8.
|
Microsoft encyclopedia of security
by Tulloch, Mitch. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Redmond, Wash. : Microsoft Press, 2003Online access: Contributor biographical information | Publisher description Availability: Items available for reference: IIITD [REF 005.803 TUL-M] (1).
|
|
9.
|
Computer forensics and cyber crime : an introduction
by Britz, Marjie. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Upper Saddle River, N.J. : Pearson, ©2009Online access: Table of contents only Availability: Items available for reference: IIITD [REF 005.8 BRI-C] (1).
|
|
10.
|
Investigative data mining for security and criminal detection
by Mena, Jesus. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Amsterdam ; Boston, MA : Butterworth-Heinemann, 2003Online access: Publisher description | Table of contents Availability: No items available Withdrawn (1).
|
|
11.
|
Core security patterns : best practices and strategies for J2EE, web services, and identity management
by Steel, Christopher 1968- | Nagappan, Ramesh | Lai, Ray. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Upper Saddle River, NJ : Prentice Hall, c2006Online access: Table of contents Availability: Items available for loan: IIITD [005.8 STE-C] (1).
|
|
12.
|
Network security essentials : applications and standards
by Stallings, William. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Upper Saddle River, NJ : Pearson Education, c2007Online access: Table of contents only Availability: Items available for loan: IIITD [005.8 STA-N] (1).
|
|
13.
|
Secure coding : principles and practices
by Graff, Mark G | Van Wyk, Kenneth R. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: New Delhi : SPD, 2003Availability: Items available for loan: IIITD [005.8 GRA-S] (4). Items available for reference: IIITD [REF 005.8 GRA-S] (1).
|
|
14.
|
Introduction to computer security
by Bishop, Matt. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Boston : Pearson, ©2006Online access: Table of contents Availability: Items available for loan: IIITD [005.8 BIS-I] (8). Items available for reference: IIITD [REF 005.8 BIS-I] (1).
|
|
15.
|
Web hacking attack and defense
by McClure, Stuart | Shah, Saumil | Shah, Shreeraj. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Pearson, 2009Availability: Items available for loan: IIITD [005.8 MCC-W] (1).
|
|
16.
|
Applied cryptography : protocols, algorithms, and source code in C
by Schneier, Bruce. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: New York : Wiley, ©2001Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: IIITD [005.82 SCH-A] (5). Items available for reference: IIITD [REF 005.82 SCH-A] (1).
(1 votes)
|
|
17.
|
Introduction to modern cryptography
by Katz, Jonathan 1974- | Lindell, Yehuda. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Boca Raton : Chapman & Hall/CRC, c2008Online access: Table of contents only | Publisher description Availability: Items available for loan: IIITD [REF 005.82 KAT-I] (1). Checked out (1).
|
|
18.
|
Digital watermarking and steganography
by Cox, Ingemar J | Miller, Matthew L | Bloom, Jeffrey A | Fridrich, Jessica | Kalker, Ton. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Amsterdam ; Boston : Morgan Kaufmann, ©2008Online access: Table of contents only | Publisher description Availability: Items available for loan: IIITD [005.8 COX-D] (1). Items available for reference: IIITD [REF 005.8 COX-D] (1).
|
|
19.
|
Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors.
by Katzenbeisser, Stefan | Petitcolas, Fabien A. P. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Boston : Artech House, 2000Availability: Items available for loan: IIITD [REF 005.8 KAT-I] (1).
|
|
20.
|
Pervasive information security and privacy developments : trends and advancements
by Nemati, Hamid R. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Hershey, PA : Information Science Reference, c2011Availability: Items available for loan: IIITD [REF 005.8 NEM-P] (1).
|